SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS EDU Summer Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS SLTT Government’s Aggregate Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
It’s 2024. Ransomware is no longer new, the threats and risks are well known, the cases and payouts are public. Even with this ominous threats, why are security teams still caught off guard when their environments fall victim? It’s 2024 - the year we stop waiting for the adversary.
In this intro to hardware hacking we'll introduce you to PulseView - the 'Wireshark of hardware hacking' and we'll unveil a technique behind unlocking a keypad safe, relying solely on its user interface.Our approach? A Side-Channel Timing Attack.
We are confronted by so many cyber threat actors, with the primary focus being on external threats, and when it comes to internal threats, the focus is often on internal negligence. But the reality is we are seeing in more and more cases that external threat actors are actually simply corrupting internal staff members, often in trusted IT and security positions, to overcome even the most sophisticated cyber security systems.
Everyone looks forward to and loves an upgrade. An upgrade to a suite in a hotel or an upgrade to first class for a flight always makes for a much more enjoyable trip.
Our applications and APIs are the gateways to our most sensitive and valuable data. As such, application and API security has become more and more essential to protecting our organizations. On this webcast, SANS certified instructor David Hazar will review the results of our 2024 AppSec/DevSecOps survey, and provide insight into:The best way to provide API securityInvestment trends in automated testing technologiesWhich tests are more important or more effective for APIsRegister for this webcast now, and you will automatically receive the companion white paper upon publication.
In recent times, the landscape of Security Information and Event Management (SIEM) solutions has experienced a remarkable metamorphosis. No longer confined to being mere data repositories, SIEM platforms have evolved into dynamic hubs brimming with invaluable insights. Join us in this webcast as we embark on a journey through the contemporary realm of SIEM, spotlighting its departure from traditional methodologies, shifting to the cloud, and its embrace of cutting-edge technologies like Artificial Intelligence (AI) and machine learning.
近年、ランサムウェア攻撃は、個人や企業のみならず、重要インフラをも標的とする大きなな脅威へと進化しています。2023年はランサムウェアにとって大きな年であり、2024年もその勢いが衰えるとは考えられません。このプレゼンテーションでは、ランサムウェアの現状、攻撃時によく見られる手口やテクニック、2023年のランサムウェア攻撃への対応から得られた教訓を包括的にご紹介します。
In this webcast, we will quickly review the incident affecting Achilles Systems, including their basic “block and tackle” approach to vulnerability management.
How do applications download Internet resources like files, how are specific requests crafted like GET and POST, how are headers and user agent strings created? This part of the series will answer all of those questions by introducing two Win32 libraries: WinHttp and WinINet.
Embark on a journey through the skies of Kubernetes as we navigate the fundamentals, deployment strategies, and security for a seamless transition from traditional cloud instances to containerized infrastructure.